Privacy‐preserving Biometric authentication: challenges and directions

E Pagnin, A Mitrokotsa - Security and Communication …, 2017 - Wiley Online Library
An emerging direction for authenticating people is the adoption of biometric authentication
systems. Biometric credentials are becoming increasingly popular as a means of …

Secure and efficient protocols for iris and fingerprint identification

M Blanton, P Gasti - Computer Security–ESORICS 2011: 16th European …, 2011 - Springer
Recent advances in biometric recognition and the increasing use of biometric data prompt
significant privacy challenges associated with the possible misuse, loss, or theft of biometric …

A private and reliable recommendation system for social networks

TR Hoens, M Blanton… - 2010 IEEE Second …, 2010 - ieeexplore.ieee.org
With the proliferation of internet-based social networks into our lives, new mechanisms to
control the release and use of personal data are required. As a step toward this goal, we …

Map** biometrics to a unique key

A Malpani, R Varadarajan - US Patent 9,165,130, 2015 - Google Patents
US9165130B2 - Map** biometrics to a unique key - Google Patents US9165130B2 - Map**
biometrics to a unique key - Google Patents Map** biometrics to a unique key Download PDF …

A lightweight privacy-aware continuous authentication protocol-paca

A Acar, S Ali, K Karabina, C Kaygusuz, H Aksu… - ACM Transactions on …, 2021 - dl.acm.org
As many vulnerabilities of one-time authentication systems have already been uncovered,
there is a growing need and trend to adopt continuous authentication systems. Biometrics …

Biometric-based non-transferable anonymous credentials

M Blanton, WMP Hudelson - … , ICICS 2009, Bei**g, China, December 14-17 …, 2009 - Springer
This work explores the problem of using biometric data to achieve non-transferability of
anonymous credentials; that is, sharing of anonymous credentials, which allow one to …

Secure and verifiable outsourcing of large-scale biometric computations

M Blanton, Y Zhang, KB Frikken - ACM Transactions on Information and …, 2013 - dl.acm.org
Cloud computing services are becoming more prevalent and readily available today,
bringing to us economies of scale and making large-scale computation feasible. Security …

Secure authentication mechanism using quick response codes

S Sadacharam, R Viswanathan - US Patent 9,300,658, 2016 - Google Patents
BACKGROUND The present invention relates to authentication ofuser iden tity, and more
specifically to secure authentication of a user's identity through quick response (QR) codes …

Linear round bit-decomposition of secret-shared values

T Veugen - IEEE Transactions on Information Forensics and …, 2014 - ieeexplore.ieee.org
In the field of signal processing in the encrypted domain, linear operations are usually easy
to perform, whereas multiplications, and bitwise operations like comparison, are more costly …

Secure authentication mechanism using quick response codes

S Sadacharam, R Viswanathan - US Patent 9,659,163, 2017 - Google Patents
(57) ABSTRACT A method of securing authentication of a user's identity is disclosed. The
method comprises the steps of an authenti cation program of an entity receiving initiation of …